CVE-2000-0378 – RedHat Linux 6.0/6.1/6.2 - 'pam_console' Monitor Activity After Logout
https://notcve.org/view.php?id=CVE-2000-0378
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in. • https://www.exploit-db.com/exploits/19900 http://archives.neohapsis.com/archives/bugtraq/2000-05/0023.html http://www.securityfocus.com/bid/1176 •
CVE-2000-0336 – OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink
https://notcve.org/view.php?id=CVE-2000-0336
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19946 ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt http://www.redhat.com/support/errata/RHSA-2000-012.html http://www.securityfocus.com/bid/1232 http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html •
CVE-2000-0286 – RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service)
https://notcve.org/view.php?id=CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server. • https://www.exploit-db.com/exploits/19850 http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html http://www.securityfocus.com/bid/1111 •
CVE-2000-0263 – RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service)
https://notcve.org/view.php?id=CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/19850 http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html http://www.securityfocus.com/bid/1111 •
CVE-2000-0289
https://notcve.org/view.php?id=CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html http://www.novell.com/linux/security/advisories/suse_security_announce_48.html http://www.securityfocus.com/bid/1078 •